Cyber Posture

CVE-2026-4283

CriticalUpdated

Published: 24 March 2026

Published
24 March 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
EPSS Score 0.0020 41.2th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-4283 is a critical-severity Missing Authorization (CWE-862) vulnerability in Wordpress (inferred from references). Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 41.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and AC-3 (Access Enforcement).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 requires enforcement of approved authorizations on the super-unsubscribe AJAX action to block unauthenticated access and prevent account destruction.

prevent

AC-2 establishes account management processes to protect non-administrator user accounts from unauthorized irreversible modifications like password randomization, role stripping, and metadata wiping.

prevent

AC-6 least privilege ensures unauthenticated users cannot access destructive functions like super-unsubscribe that bypass email confirmation and anonymize accounts.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1531 Account Access Removal Impact
Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

The vulnerability allows unauthenticated exploitation of a public-facing WordPress plugin (T1190) to remove account access by destroying user accounts (T1531) and manipulate stored user data such as usernames, emails, and metadata (T1565.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The WP DSGVO Tools (GDPR) plugin for WordPress is vulnerable to unauthorized account destruction in all versions up to, and including, 3.1.38. This is due to the `super-unsubscribe` AJAX action accepting a `process_now` parameter from unauthenticated users, which bypasses the…

more

intended email-confirmation flow and immediately triggers irreversible account anonymization. This makes it possible for unauthenticated attackers to permanently destroy any non-administrator user account (password randomized, username/email overwritten, roles stripped, comments anonymized, sensitive usermeta wiped) by submitting the victim's email address with `process_now=1`. The nonce required for the request is publicly available on any page containing the `[unsubscribe_form]` shortcode.

Deeper analysisAI

CVE-2026-4283 affects the WP DSGVO Tools (GDPR) plugin for WordPress in all versions up to and including 3.1.38. The vulnerability enables unauthorized account destruction due to the `super-unsubscribe` AJAX action, which accepts a `process_now` parameter from unauthenticated users. This bypasses the intended email-confirmation flow and immediately triggers irreversible account anonymization, stemming from a missing authorization check akin to CWE-862 (Missing Authorization).

Unauthenticated attackers can exploit this by submitting a victim's email address along with `process_now=1` via the AJAX endpoint. The required nonce is publicly available on any page containing the `[unsubscribe_form]` shortcode, making exploitation straightforward over the network with low complexity and no privileges needed. Successful attacks permanently destroy non-administrator user accounts by randomizing passwords, overwriting usernames and emails, stripping roles, anonymizing comments, and wiping sensitive usermeta, earning a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H).

References provided by the CVE point to specific vulnerable code locations in the plugin's source, including lines in `class-sp-dsgvo-ajax-action.php` (L69), `class-sp-dsgvo-data-collecter.php` (L250), `unsubscriber.php` (L24), and `unsubscribe-form-action.php` (L39) across tags/3.1.38 and trunk branches on the WordPress plugin trac repository. No explicit patch or mitigation details are detailed in the provided information.

Details

CWE(s)

Affected Products

Wordpress
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-4277Shared CWE-862
CVE-2025-1657Shared CWE-862
CVE-2026-27386Shared CWE-862
CVE-2025-26372Shared CWE-862
CVE-2026-27071Shared CWE-862
CVE-2026-3360Shared CWE-862
CVE-2025-0952Shared CWE-862
CVE-2025-26733Shared CWE-862
CVE-2026-34053Shared CWE-862
CVE-2025-24591Shared CWE-862

References